Adobe releases emergency Flash fixes for two zero-day bugs

Both Windows and OS X already under attack

Adobe on Thursday updated Flash Player to patch a pair of zero-day vulnerabilities that hackers were already using to hijack Windows PCs and Macs.

The out-of-band, or emergency, update was Flash's first of the year and the first since Adobe moved the media software to a regular update schedule last fall.

[Faster, better, stronger: Get your PC in tip-top shape and 3 ways to be more agile with software shipping decisions]

As part of that schedule, Adobe was to ship a Flash Player update next Tuesday, but it instead released the fixes early. In a Thursday advisory, Adobe confirmed that the update patched two vulnerabilities, designated CVE-2013-0633 and CVE-2013-0634. Not surprisingly, it rated the update critical: Criminals have been exploiting both vulnerabilities for an undisclosed amount of time.

"Adobe is aware of reports that CVE-2013-0633 is being exploited in the wild in targeted attacks designed to trick the user into opening a Microsoft Word document delivered as an email attachment which contains malicious Flash content," stated the advisory.

The second vulnerability, CVE-2013-0633, has been used in a similar fashion against Windows targets, but has also been exploited during "drive-by" attacks against Firefox and Safari users on the Mac, said Adobe. A drive-by attack requires only that a victim be duped into browsing to a malicious website hosting an exploit.

Most Flash exploits are aimed at Windows users simply because they constitute the vast majority of potential victims. It's unusual for attacks to also target Macs running Apple's OS X.

Users should update the Windows and OS X editions of Flash Player as soon as possible, said Adobe. People running Flash on Linux and Android need not be in a hurry: Adobe pegged their updates with a priority rating of "3," a label that means users can apply the patches at their discretion.

Because the only reported drive-by attacks, which are indiscriminate rather than targeted, have taken aim at OS X, Mac owners should be especially quick to do an update.

Shortly before Adobe published its advisory, Microsoft posted one of its own to warn users that an IE10 update for Windows 8 and Windows RT was also available. Microsoft has copied a page out of Google Chrome's playbook and baked Flash into its newest browser.

As of Thursday at 6:30 p.m. PT (9:30 ET), however, Google had not yet released a new version of Chrome that included the updated Flash.

Adobe credited a pair of Kaspersky Lab researchers with reporting CVE-2013-0633, and said CVE-2013-0634 had been submitted by the ShadowServer Foundation, aerospace company Lockheed Martin, and MITRE, a firm that manages several research centers funded by U.S. government agencies, including the National Security Engineering Center for the Department of Defense.

Lockheed Martin and MITRE are no strangers to Adobe. In December 2011, the two were credited with reporting an Adobe Reader vulnerability. Like those patched today, the Reader flaw was a zero-day bug that was already in use by attackers by the time it was revealed.

1 2 Page 1
Page 1 of 2
Bing’s AI chatbot came to work for me. I had to fire it.
Shop Tech Products at Amazon